Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: update go packages #38

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open

chore: update go packages #38

wants to merge 1 commit into from

Conversation

renovate[bot]
Copy link

@renovate renovate bot commented Aug 19, 2024

Update Request | Renovate Bot

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
github.com/ProtonMail/go-crypto v1.1.0-alpha.5.0.20240827111422-b5837fa4476e -> v1.1.4 age adoption passing confidence
github.com/ProtonMail/gopenpgp/v2 v2.7.5 -> v2.8.2 age adoption passing confidence
github.com/adrg/xdg v0.5.0 -> v0.5.3 age adoption passing confidence
github.com/grpc-ecosystem/grpc-gateway/v2 v2.22.0 -> v2.25.1 age adoption passing confidence
github.com/stretchr/testify v1.9.0 -> v1.10.0 age adoption passing confidence
google.golang.org/grpc v1.66.0 -> v1.69.2 age adoption passing confidence
google.golang.org/protobuf v1.34.2 -> v1.36.2 age adoption passing confidence

Release Notes

ProtonMail/go-crypto (github.com/ProtonMail/go-crypto)

v1.1.4

Compare Source

What's Changed

Full Changelog: ProtonMail/go-crypto@v1.1.3...v1.1.4

v1.1.3

Compare Source

What's Changed

Full Changelog: ProtonMail/go-crypto@v1.1.2...v1.1.3

v1.1.2

Compare Source

What's Changed

Full Changelog: ProtonMail/go-crypto@v1.1.1...v1.1.2

v1.1.1

Compare Source

What's Changed

Full Changelog: ProtonMail/go-crypto@v1.1.0...v1.1.1

v1.1.0

Compare Source

What's Changed

This release adds full support for the new version of the OpenPGP standard, RFC 9580. In addition, the release introduces an improved non-backwards compatible v2 API. The API in the openpgp package remains fully backwards compatible while the new v2 API is located in a separate v2 package in openpgp.

For the full changes since v1.0.0, see the previous release notes. For the full changelog, see ProtonMail/go-crypto@v1.0.0...v1.1.0.

Changes since v1.1.0-beta.0:

  • Replace expiring curve448 integration test vector by @​lubux
  • Validate input key size in SEIPDv2 decryption by @​lubux

Changelog since v1.1.0-beta.0: ProtonMail/go-crypto@v1.1.0-beta.0...v1.1.0.

v1.1.0-proton

Compare Source

What's Changed

This release is v1.1.0 with support for symmetric keys and automatic forwarding, both of which are not standardized yet.

v1.1.0-beta.0-proton

Compare Source

This pre-release is v1.1.0-beta.0 with support for symmetric keys and automatic forwarding, both of which are not standardized yet.

v1.1.0-beta.0

Compare Source

What's Changed

Full Changelog: ProtonMail/go-crypto@v1.1.0-alpha.5...v1.1.0-beta.0

v1.1.0-alpha.5-proton

Compare Source

This pre-release is v1.1.0-alpha.5 with support for symmetric keys and automatic forwarding, both of which are not standardized yet.

v1.1.0-alpha.4-proton

Compare Source

This pre-release is v1.1.0-alpha.4 with support for symmetric keys and automatic forwarding, both of which are not standardized yet.

v1.1.0-alpha.3-proton

Compare Source

This pre-release is v1.1.0-alpha.3 with support for symmetric keys and automatic forwarding, both of which are not standardized yet.

v1.1.0-alpha.2-proton

Compare Source

v1.1.0-alpha.1-proton

Compare Source

This pre-release is v1.1.0-alpha.1 with support for symmetric keys and automatic forwarding, both of which are not standardized yet.

ProtonMail/gopenpgp (github.com/ProtonMail/gopenpgp/v2)

v2.8.2

Compare Source

What's Changed

Changed
  • Update go-crypto fork to v1.1.4

Full Changelog: ProtonMail/gopenpgp@v2.8.1...v2.8.2

v2.8.1

Compare Source

What's Changed

Changed
  • Update go-crypto fork to v1.1.3

Full Changelog: ProtonMail/gopenpgp@v2.8.0...v2.8.1

v2.8.0

Compare Source

What's Changed

Support for RFC 9580

Adds support for reading and writing messages with RFC 9580 by updating the underlying go-crypto fork library to the latest version. Note that GopenPGP v2 currently does not support:

  • RFC 9580 intended recipients
  • RFC 9580 key generation

For full RFC 9580 support, we recommend upgrading to GopenPGP v3.

Full Changelog: ProtonMail/gopenpgp@v2.7.5...v2.8.0

adrg/xdg (github.com/adrg/xdg)

v0.5.3

Compare Source

Changelog
  • Updated xdg.SearchRuntimeFile to also look in the operating system's temporary directory for runtime files.
    This covers unlikely cases in which runtime files cannot be written relative to the base runtime directory either because it does not exist or it is not accessible, so xdg.RuntimeFile suggests the operating system's temporary directory as a suitable fallback location.
Internal
  • Improved package testing.

v0.5.2

Compare Source

Changelog
  • Updated logic of xdg.RuntimeFile: due to the special nature of the runtime directory, the function no longer attempts to create it if it does not exist. If that's the case, the function uses the operating system's temporary directory as a fallback. The function still creates subdirectories relative to the base runtime directory or its fallback.

    Justification: the creation of the runtime directory is not in the scope of this package as it has special requirements defined by the XDG Base Directory Specification. Relevant excerpt:

    The lifetime of the directory MUST be bound to the user being logged in. It MUST be created when the user first logs in and if the user fully logs out the directory MUST be removed. If the user logs in more than once they should get pointed to the same directory, and it is mandatory that the directory continues to exist from their first login to their last logout on the system, and not removed in between. Files in the directory MUST not survive reboot or a full logout/login cycle.

    Also, on Linux, the parent directories of the default user runtime directory are owned by the root user so they cannot be created by a regular user. pam_systemd is usually responsible for creating the runtime directory (/run/user/$UID).

v0.5.1

Compare Source

Changelog
  • Added support for the non-standard XDG_BIN_HOME base directory.
    See XDG base directories README section for more details.
  • Added more config and data search locations on macOS.
    • Added ~/.config at the end of the list of default locations for XDG_CONFIG_DIRS.
    • Added ~/.local/share at the end of the list of default locations for XDG_DATA_DIRS.
  • Added more application search locations on Windows:
    • %ProgramFiles%
    • %ProgramFiles%\Common Files
    • %LOCALAPPDATA%\Programs
    • %LOCALAPPDATA%\Programs\Common
Internal
  • Updated golang.org/x/sys dependency to the latest version.
  • Improved package testing.
grpc-ecosystem/grpc-gateway (github.com/grpc-ecosystem/grpc-gateway/v2)

v2.25.1

Compare Source

Support the new Opaque API in openapiv2 generated files

This release contains breaking changes from v2.25.0, in that the previously deprecated EnumDescriptor and Descriptor methods on the struct types in the openapiv2 options package have been removed. This seems to be a requirement to generate the new Hybrid API. Please open an issue if you were depending on these functions and we'll see what we can do about it.

What's Changed

Full Changelog: grpc-ecosystem/grpc-gateway@v2.25.0...v2.25.1

v2.25.0

Compare Source

What's Changed

New Contributors

Full Changelog: grpc-ecosystem/grpc-gateway@v2.24.0...v2.25.0

v2.24.0

Compare Source

What's Changed

New Contributors

Full Changelog: grpc-ecosystem/grpc-gateway@v2.23.0...v2.24.0

v2.23.0

Compare Source

What's Changed

New Contributors

Full Changelog: grpc-ecosystem/grpc-gateway@v2.22.0...v2.23.0

stretchr/testify (github.com/stretchr/testify)

v1.10.0

Compare Source

What's Changed

Functional Changes
Fixes
Documantation, Build & CI

New Contributors

Full Changelog: stretchr/testify@v1.9.0...v1.10.0

grpc/grpc-go (google.golang.org/grpc)

v1.69.2: Release 1.69.2

Compare Source

Bug Fixes

  • stats/experimental: add type aliases for symbols (Metrics/etc) that were moved to the stats package (#​7929).
  • client: set user-agent string to the correct version.

v1.69.0: Release 1.69.0

Compare Source

Known Issues

  • The recently added grpc.NewClient function is incompatible with forward proxies, because it resolves the target hostname on the client instead of passing the hostname to the proxy. A fix is expected to be a part of grpc-go v1.70. (#​7556)

New Features

  • stats/opentelemetry: Introduce new APIs to enable OpenTelemetry instrumentation for metrics on servers and clients (#​7874)
  • xdsclient: add support to fallback to lower priority servers when higher priority ones are down (#​7701)
  • dns: Add support for link local IPv6 addresses (#​7889)
  • The new experimental pickfirst LB policy (disabled by default) supports Happy Eyeballs, interleaving IPv4 and IPv6 address as described in RFC-8305 section 4, to attempt connections to multiple backends concurrently. The experimental pickfirst policy can be enabled by setting the environment variable GRPC_EXPERIMENTAL_ENABLE_NEW_PICK_FIRST to true. (#​7725, #​7742)
  • balancer/pickfirst: Emit metrics from the pick_first load balancing policy (#​7839)
  • grpc: export MethodHandler, which is the type of an already-exported field in MethodDesc (#​7796)

Bug Fixes

  • credentials/google: set scope for application default credentials (#​7887)
  • xds: fix edge-case issues where some clients or servers would not initialize correctly or would not receive errors when resources are invalid or unavailable if another channel or server with the same target was already in use . (#​7851, #​7853)
  • examples: fix the debugging example, which was broken by a recent change (#​7833)

Behavior Changes

  • client: update retry attempt backoff to apply jitter per updates to gRFC A6. (#​7869)
  • balancer/weightedroundrobin: use the pick_first LB policy to manage connections (#​7826)

API Changes

  • balancer: An internal method is added to the balancer.SubConn interface to force implementors to embed a delegate implementation. This requirement is present in the interface documentation, but wasn't enforced earlier. (#​7840)

Performance Improvements

  • mem: implement a ReadAll() method for more efficient io.Reader consumption (#​7653)
  • mem: use slice capacity instead of length to determine whether to pool buffers or directly allocate them (#​7702)

Documentation

  • examples/csm_observability: Add xDS Credentials and switch server to be xDS enabled (#​7875)

v1.68.2: Release 1.68.2

Compare Source

Dependencies

  • Remove the experimental stats/opentelemetry module and instead add the experimental packages it contains directly into the main google.golang.org/grpc module (#​7936)

v1.68.1: Release 1.68.1

Compare Source

Bug Fixes

  • credentials/alts: avoid SRV and TXT lookups for handshaker service to work around hangs caused by buggy versions of systemd-resolved. (#​7861)

Dependencies

  • Relax minimum Go version requirement from go1.22.7 to go1.22. (#​7831)

v1.68.0: Release 1.68.0

Compare Source

Behavior Changes

  • stats/opentelemetry/csm: Get mesh_id local label from "CSM_MESH_ID" environment variable, rather than parsing from bootstrap file (#​7740)
  • orca (experimental): if using an ORCA listener, it must now be registered only on a READY SubConn, and the listener will automatically be stopped when the connection is lost. (#​7663)
  • client: ClientConn.Close() now closes transports simultaneously and waits for transports to be closed before returning. (#​7666)
  • credentials: TLS credentials created via NewTLS that use tls.Config.GetConfigForClient will now have CipherSuites, supported TLS versions and ALPN configured automatically. These were previously only set for configs not using the GetConfigForClient option. (#​7709)

Bug Fixes

  • transport: prevent deadlock in client transport shutdown when writing the GOAWAY frame hangs. (#​7662)
  • mem: reuse buffers more accurately by using slice capacity instead of length (#​7702)
  • status: Fix regression caused by #​6919 in status.Details() causing it to return a wrapped type when getting proto messages generated with protoc-gen-go < v1. (#​7724)

Dependencies

  • Bump minimum supported Go version to go1.22.7. (#​7624)

v1.67.3: Release 1.67.3

Compare Source

Dependencies

  • Remove the experimental stats/opentelemetry module and instead add the experimental packages it contains directly into the main google.golang.org/grpc module.

v1.67.2: Release 1.67.2

Compare Source

Bug Fixes

  • credentials/alts: avoid SRV and TXT lookups for handshaker service to work around hangs caused by buggy versions of systemd-resolved. (#​7861)

v1.67.1: Release 1.67.1

Compare Source

Bug Fixes

  • transport: Fix a bug causing stream failures due to miscalculation of the flow control window in both clients and servers. (#​7667)
  • xds/server: Fix xDS Server memory leak. (#​7681)

v1.67.0: Release 1.67.0

Compare Source

Bug Fixes

  • ringhash: when used with multiple EDS priorities, fix bug that could prevent a higher priority from recovering from transient failure. (#​7364)

Behavior Changes

  • In accordance with RFC 7540, clients and servers will now reject TLS connections that don't support ALPN. This can be disabled by setting the environment variable GRPC_ENFORCE_ALPN_ENABLED to false (case insensitive). Please file a bug if you encounter any issues with this behavior. The environment variable to revert this behavior will be removed in an upcoming release. (#​7535)

v1.66.3: Release 1.66.3

Compare Source

Bug Fixes

  • transport: Fix a bug causing stream failures due to miscalculation of the flow control window in both clients and servers. (#​7667)
  • xds/server: Fix xDS Server memory leak. (#​7681)

v1.66.2: Release 1.66.2

Compare Source

Dependencies

  • Remove unintentional dependency on the testing package (#​7579)
  • Remove unintentional dependency on the flate package (#​7595)

Bug Fixes

  • client: fix a bug that prevented memory reuse after handling unary RPCs (#​7571)

v1.66.1

Compare Source

protocolbuffers/protobuf-go (google.golang.org/protobuf)

v1.36.2

Compare Source

Full Changelog: protocolbuffers/protobuf-go@v1.36.1...v1.36.2

Bug fixes:
CL/638515: internal/impl: fix WhichOneof() to work with synthetic oneofs

v1.36.1

Compare Source

Full Changelog: protocolbuffers/protobuf-go@v1.36.0...v1.36.1

Bug fixes:
CL/638495: internal/impl: revert IsSynthetic() check to fix panic

Maintenance:
CL/637475: internal/errors: delete compatibility code for Go before 1.13

v1.36.0

Compare Source

Full Changelog: protocolbuffers/protobuf-go@v1.35.2...v1.36.0

User-visible changes:

CL/635139: src/google/protobuf: document UnmarshalJSON / API level behavior
CL/635138: reflect/protoreflect: use [] syntax to reference method
CL/635137: proto: add reference to size semantics with lazy decoding to comment
CL/634818: compiler/protogen: allow overriding API level from --go_opt
CL/634817: cmd/protoc-gen-go: generate _protoopaque variant for hybrid
CL/634816: all: regenerate.bash for Opaque API
CL/634815: all: Release the Opaque API
CL/634015: types/descriptorpb: regenerate using latest protobuf v29.1 release
CL/632735: internal/impl: skip synthetic oneofs in messageInfo
CL/627876: all: start v1.35.2-devel

v1.35.2

Compare Source

Full Changelog: protocolbuffers/protobuf-go@v1.35.1...v1.35.2

Maintenance:

CL/623115: proto: refactor equal_test from explicit table to use makeMessages()
CL/623116: encoding/prototext: use testmessages_test.go approach, too
CL/623117: internal/testprotos/test: add nested message field with [lazy=true]
CL/624415: proto: switch messageset_test to use makeMessages() injection point
CL/624416: internal/impl: fix TestMarshalMessageSetLazyRace (was a no-op!)

User-visible changes:

[CL/618395](https


Configuration

📅 Schedule: Branch creation - "* 0-3 * * 1" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/go-packages branch 2 times, most recently from b0be26c to 89ac43a Compare August 29, 2024 10:12
@renovate renovate bot changed the title chore: update go packages chore: update module github.com/protonmail/go-crypto to v1.1.0-alpha.5-proton Aug 29, 2024
@renovate renovate bot force-pushed the renovate/go-packages branch from 89ac43a to 33ebac9 Compare September 3, 2024 10:19
@renovate renovate bot force-pushed the renovate/go-packages branch from 33ebac9 to cb75507 Compare September 12, 2024 08:52
@renovate renovate bot changed the title chore: update module github.com/protonmail/go-crypto to v1.1.0-alpha.5-proton chore: update go packages Sep 12, 2024
@renovate renovate bot force-pushed the renovate/go-packages branch from cb75507 to 7e38cb6 Compare September 21, 2024 14:34
@renovate renovate bot force-pushed the renovate/go-packages branch 2 times, most recently from dcddf67 to 4d38d54 Compare October 8, 2024 02:39
@renovate renovate bot force-pushed the renovate/go-packages branch from 4d38d54 to 6197901 Compare October 29, 2024 23:53
Copy link
Author

renovate bot commented Oct 29, 2024

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 6 additional dependencies were updated

Details:

Package Change
golang.org/x/crypto v0.26.0 -> v0.31.0
golang.org/x/net v0.28.0 -> v0.33.0
golang.org/x/sys v0.24.0 -> v0.28.0
golang.org/x/text v0.17.0 -> v0.21.0
google.golang.org/genproto/googleapis/api v0.0.0-20240827150818-7e3bb234dfed -> v0.0.0-20241219192143-6b3ec007d9bb
google.golang.org/genproto/googleapis/rpc v0.0.0-20240827150818-7e3bb234dfed -> v0.0.0-20241219192143-6b3ec007d9bb

@renovate renovate bot force-pushed the renovate/go-packages branch 3 times, most recently from 490d797 to 91afd99 Compare November 7, 2024 20:14
@renovate renovate bot force-pushed the renovate/go-packages branch 2 times, most recently from 6193873 to 28749cd Compare November 15, 2024 05:37
@renovate renovate bot force-pushed the renovate/go-packages branch 4 times, most recently from 9cb2460 to 920361c Compare November 27, 2024 20:25
@renovate renovate bot force-pushed the renovate/go-packages branch from 920361c to 524c0ef Compare December 6, 2024 02:59
@renovate renovate bot force-pushed the renovate/go-packages branch 2 times, most recently from 0eb9543 to 1e28209 Compare December 18, 2024 05:45
@renovate renovate bot force-pushed the renovate/go-packages branch 2 times, most recently from 10f6eb7 to 1f25708 Compare December 24, 2024 14:54
Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
@renovate renovate bot force-pushed the renovate/go-packages branch from 1f25708 to 661909a Compare January 9, 2025 23:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants